CVE-2024-38405
📋 TL;DR
This vulnerability allows attackers to cause a Denial of Service (DoS) condition by sending specially crafted Radio Resource Control (RRC) messages containing malformed CU information in RNR IE. It affects Qualcomm chipsets used in mobile devices and IoT equipment. The attack requires proximity to the target device.
💻 Affected Systems
- Qualcomm Snapdragon chipsets with 5G/4G modems
📦 What is this software?
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 2 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 2 Mobile Platform Firmware →
Snapdragon 8 Gen 3 Mobile Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon 8 Gen 3 Mobile Platform Firmware →
Snapdragon Ar2 Gen 1 Platform Firmware by Qualcomm
View all CVEs affecting Snapdragon Ar2 Gen 1 Platform Firmware →
Snapdragon Auto 5g Modem Rf Gen 2 Firmware by Qualcomm
View all CVEs affecting Snapdragon Auto 5g Modem Rf Gen 2 Firmware →
Snapdragon X72 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X72 5g Modem Rf System Firmware →
Snapdragon X75 5g Modem Rf System Firmware by Qualcomm
View all CVEs affecting Snapdragon X75 5g Modem Rf System Firmware →
Video Collaboration Vc3 Platform Firmware by Qualcomm
View all CVEs affecting Video Collaboration Vc3 Platform Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete device crash requiring physical restart, disrupting all cellular connectivity and device functionality until reboot.
Likely Case
Temporary loss of cellular connectivity (5G/4G) for several minutes until the device recovers automatically.
If Mitigated
Brief service interruption with automatic recovery within seconds if proper network segmentation and monitoring are in place.
🎯 Exploit Status
Requires specialized radio equipment and knowledge of cellular protocols to craft malicious RRC messages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware updates specified in Qualcomm November 2024 security bulletin
Vendor Advisory: https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html
Restart Required: Yes
Instructions:
1. Check device manufacturer for available firmware updates. 2. Apply Qualcomm-provided patches through OEM update channels. 3. Reboot device after update installation.
🔧 Temporary Workarounds
Disable affected cellular bands
allTemporarily disable 5G NR bands that use the vulnerable CU information processing
# Device-specific commands vary by manufacturer
# Typically in modem configuration settings
🧯 If You Can't Patch
- Implement network monitoring for abnormal RRC message patterns
- Use physical security controls to limit proximity-based attacks in sensitive areas
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against Qualcomm's affected versions list in the November 2024 bulletin
Check Version:
# Android: Settings > About Phone > Baseband version
# Linux: modem manager commands vary by distribution
Verify Fix Applied:
Verify firmware version has been updated to patched version from device manufacturer
📡 Detection & Monitoring
Log Indicators:
- Modem crash logs
- RRC connection failure events
- Unexpected modem resets
Network Indicators:
- Abnormal RRC message patterns
- Multiple connection attempts with malformed IE
SIEM Query:
source="modem_logs" AND (event="crash" OR event="reset") AND message="RNR"